Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus

Inactive Publication Date: 2008-06-17
PANASONIC CORP
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0017]In view of the above problem, the object of the present invention is to provide an elliptic curve exponentiation apparatus that can counter the DFA when an elliptic curve exponentiation technique is used, and also to provide an elliptic curve exponentiation method, a computer program for computation of an elliptic curve exponentiation, and an information security apparatus.
[0023]According to this construction, the coefficient b that is a constant term of the elliptic curve E is obtained and is written into the second storage unit. By changing a value of the constant term coefficient b, therefore, a different elliptic curve can be set. Accordingly, an elliptic curve does not need to be fixed but various elliptic curves can be used, thereby enabling the versatility featured by elliptic curve cryptography to be maintained.

Problems solved by technology

However, Japanese Laid-Open Patent Application No. 2002-261751 refers to the emergence of attacks of unauthorized obtaining of secret information by analyzing various information output from an IC card or the like.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus
  • Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus
  • Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

1. First Embodiment

[0051]The following describes a point issuing system 10 as a first embodiment of the present invention.

1.1 Construction of the Point Issuing System 10

[0052]The point issuing system 10 is roughly composed of an IC card 100 and a point issuing apparatus 200 as shown in FIG. 1.

[0053]The IC card 100 is loaded in the point issuing apparatus 200 by the user of the point issuing apparatus 200, so that the point issuing apparatus 200 generates points, encrypts the generated points, and transmits the encrypted points to the IC card 100. Here, the points are “bonus information” provided from the seller or the service provider to the user when the user purchases a commodity or uses service. For next commodity purchase or service use, the user can use the points as part of all of its payment to the seller or the service provider.

[0054]The IC card 100 receives the encrypted points, decrypts the encrypted points to obtain decrypted points, and internally stores the decrypted po...

second embodiment

4. Second Embodiment

[0143]The following describes a digital signature system (not shown) as a second embodiment of the present invention.

[0144]The digital signature system is roughly composed of a user A apparatus, a user B apparatus, and a management center apparatus (all not shown). The user A apparatus, the user B apparatus, and the management center apparatus are connected to one another via the Internet. The user A apparatus, the user B apparatus, and the management center apparatus are each specifically a computer system including a microprocessor, a ROM, a RAM, a hard disk unit, a display unit, a keyboard, and a mouse. A computer program is stored in the RAM or the hard disk unit. The functions of each of the user A apparatus, the user B apparatus, and the management center apparatus are realized by the microprocessor operating in accordance with the computer program.

[0145]The user A apparatus sends a message, together with digital signature data, to the user B apparatus. The...

third embodiment

5. Third Embodiment

[0158]The following describes a key sharing system (not shown) as a third embodiment of the present invention.

[0159]The key sharing system is roughly composed of a user A apparatus, a user B apparatus, and a management center apparatus (all not shown). The user A apparatus, the user B apparatus, and the management center apparatus are connected to one another via the Internet. The user A apparatus, the user B apparatus, and the management center apparatus are each specifically a computer system including a microprocessor, a ROM, and a RAM. The functions of each of the user A apparatus, the user B apparatus, and the management center apparatus are realized by the microprocessor operating in accordance with a computer program stored in the ROM or the RAM.

[0160]The user A apparatus and the user B apparatus each obtain the same shared key, without revealing the key to third parties.

[0161]The user A apparatus, the user B apparatus, and the management center apparatus e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is an elliptic curve exponentiation apparatus that can counter the DFA when an elliptic curve exponentiation technique is used. A computation result verification unit 127 receives, as a computation result, an exponentiation-result-point (X, Y) from an elliptic curve computation unit 124. The computation result verification unit 127 computes X3+a×X+b, and computes Y2, and outputs the received exponentiation-result-point when judging that Y2=X3+a×X+b, and does not output the received exponentiation-result-point when not judging that Y2=X3+a×X+b.

Description

[0001]This application is based on an application No. 2003-018760 filed in Japan, the content of which is hereby incorporated by reference.BACKGROUND OF THE INVENTION[0002](1) Field of the Invention[0003]The present invention relates to a computation processing technique using an elliptic curve, and in particular relates to a technique for countering Differential Fault Attack (DFA).[0004](2) Description of the Related Art[0005]Public key cryptography has conventionally been known as a method for realizing confidentiality of information, authentication of information, etc.[0006]According to public key cryptography, a pair of a secret key exclusively held by the user and a public key that is made public is generated. Encryption is performed using the public key, and decryption is performed using the secret key.[0007]Despite its large amount of computation processing, public key cryptography, which does not require a secret key to be shared by a plurality of users, is often employed in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04K1/00G06F7/72
CPCG06F7/725G06F2207/7271
Inventor ONO, TAKATOSHIMATSUZAKI, NATSUME
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products